US20240187405A1 - Third-party authentication protocols for native access control - Google Patents
Third-party authentication protocols for native access control Download PDFInfo
- Publication number
- US20240187405A1 US20240187405A1 US18/061,741 US202218061741A US2024187405A1 US 20240187405 A1 US20240187405 A1 US 20240187405A1 US 202218061741 A US202218061741 A US 202218061741A US 2024187405 A1 US2024187405 A1 US 2024187405A1
- Authority
- US
- United States
- Prior art keywords
- party
- user account
- curated data
- server
- computer
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000004891 communication Methods 0.000 claims abstract description 31
- 230000004044 response Effects 0.000 claims abstract description 15
- 238000000034 method Methods 0.000 claims description 43
- 238000013475 authorization Methods 0.000 claims description 8
- 238000005516 engineering process Methods 0.000 abstract description 20
- 230000006870 function Effects 0.000 description 20
- 230000015654 memory Effects 0.000 description 12
- 238000012517 data analytics Methods 0.000 description 4
- 238000010586 diagram Methods 0.000 description 4
- 230000036571 hydration Effects 0.000 description 3
- 238000006703 hydration reaction Methods 0.000 description 3
- 230000006855 networking Effects 0.000 description 3
- 241001122767 Theaceae Species 0.000 description 2
- 230000008676 import Effects 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 description 2
- 241000283707 Capra Species 0.000 description 1
- YCISZOVUHXIOFY-HKXOFBAYSA-N Halopredone acetate Chemical compound C1([C@H](F)C2)=CC(=O)C(Br)=C[C@]1(C)[C@]1(F)[C@@H]2[C@@H]2CC[C@](OC(C)=O)(C(=O)COC(=O)C)[C@@]2(C)C[C@@H]1O YCISZOVUHXIOFY-HKXOFBAYSA-N 0.000 description 1
- 230000036461 convulsion Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000010801 machine learning Methods 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 238000003058 natural language processing Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 238000011002 quantification Methods 0.000 description 1
- 238000009877 rendering Methods 0.000 description 1
- 238000012552 review Methods 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 230000003319 supportive effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0853—Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/01—Social networking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/102—Entity profiles
Definitions
- social networks are developed around friendships, professional relationships, or other individual connections, and some social networks create communities around topics.
- social networking platforms provide services through which users can form or interact within a social network. Users can generally post comments or other content, make connections, add links, or simply browse content created by others.
- Some social networks have moderators that moderate the content in their respective social networks or online communities. While social networks can provide entertainment, networking, commercial, or informational value, they are also subject to various challenges. For social networks that allow users to conduct buying, selling, or trading goods, there needs to be a level of safety and trust that is established to avoid fraudulent transactions. That same level of trust and candidness can also be applied in non-trade-related circumstances across the social networking platforms as well.
- FIG. 1 illustrates an example system that is configured to support user accounts in creating, managing, and participating in online communities in accordance with some aspects of the present technology.
- FIG. 2 A illustrates an example of a user interface presented by a client application in accordance with some aspects of the present technology.
- FIG. 2 B illustrates an example of a user interface presented by a client application in accordance with some aspects of the present technology.
- FIG. 3 illustrates an example sequence diagram for native access control handling based on curated data received through third-party authentication protocols in accordance with some aspects of the present technology.
- FIG. 5 illustrates an example of a GUI presenting a customization control modal for creating custom filtered access to native privileges based on data from third-party applications in accordance with some aspects of the present technology.
- FIG. 6 illustrates an example of a GUI 600 presenting a sale post based on a set of curated data originating from a third-party application, the sale post posted directly in a channel in which users can directly purchase, in accordance with some aspects of the present technology.
- FIG. 7 illustrates an example flowchart diagram for native access control handling based on curated data received through third-party authentication protocols in accordance with some aspects of the present technology.
- FIG. 8 shows an example of a system for implementing certain aspects of the present technology.
- the disclosed technology addresses the need in the art for safety measures for a community hosting service that facilitate real-world transactions, especially with regard to authenticating seller user accounts by giving buyer user accounts access to reliable information about the seller as well as restricting certain capabilities to authenticated sellers.
- By linking the seller's user account with the seller's other accounts on third-party applications not only are buyers assured that the seller is who they say they are, but posting on channels can also be restricted to authenticated sellers, reducing instances of fraud and spam.
- one aspect of the present technology is to receive authentication (i.e., via OAuth 2) from a third-party application to receive a set of curated data that is updated over time, pertaining to a third-party application user account.
- the third-party application user account is the seller's account at the third-party application.
- the community hosting service is given permission to receive the set of curated data.
- the data may pertain to a number of sales that the third-party application user account had over the past year. This information may then be used to either give the user account certain permissions, such as permissions to sell on the channel, and/or may be displayed on a profile of the user account.
- administrators may be provided the option to customize the set of curated data that is received from the third-party application.
- the customization gives administrators a more granular way to specify how they want to either present information on a profile or set access privileges. Giving the administrators the option to customize their own settings alleviates any burden on the community hosting service to provide all the various ways the administrator would want to customize their settings.
- the set of curated data from the third-party application may be used in various ways to set the parameters of native access and control. For example, administrators of servers may require that users must have had a certain level of experience in certain games in order to join a channel or send certain messages in the channel. As another example, users may be required or suggested to link to particular third-party applications such that analytics may be performed to better understand the makeup of the users in a particular server (i.e., what percentage of the users are influencers on other applications or what percentage of users have played a certain game) as data for attracting targeted brand deals.
- the present disclosure broadly covers the use of personal information data to implement one or more various disclosed embodiments, the present disclosure also contemplates that the various embodiments can also be implemented without the need for accessing such personal information data. That is, the various embodiments of the present technology are not rendered inoperable due to the lack of all or a portion of such personal information data.
- content can be selected and delivered to users by inferring preferences based on non-personal information data or a bare minimum amount of personal information, such as the content being requested by the device associated with a user, other non-personal information available to the content delivery services, or publicly available information.
- FIG. 1 illustrates an example system 100 configured to support user accounts in creating, managing and participating in online communities.
- the system 100 supports a plurality of user accounts interacting with each other in communities to which they belong.
- the system 100 illustrates an example architecture in which users of user accounts interact through an instance of client application 104 operating on a computing device.
- the client application 104 can be provided by a webpage rendered in a web browser or a downloaded client application executed by an operating system of the computing device. In some embodiments, some disparate collections of features or functionality might be available in client application 104 depending on the capabilities of the environment executing or rendering the client application 104 .
- the system 100 also includes a community hosting service 102 , which provides an infrastructure for supporting the plurality of user accounts interacting with each other in communities to which they belong.
- the community hosting service 102 can be a distributed service hosted in a cloud computing architecture.
- the community hosting service 102 is responsible for hosting various services accessible to the user accounts by the client application 104 .
- the community hosting service 102 provides a servers/guilds service 124 to enable user accounts to set up a server (also referred to as a guild) to host members interacting around one or more channels.
- a server (or guild) is a user-created environment supporting a community.
- a server is generally configured with one or more channels which are generally created around topics or sub-topics, or groups of people, and can support exchanges of communications between user accounts.
- Some channels are non-real-time channels where users communicate through written messages, images, emojis, recorded voice or video files, attachments, etc.
- Some channels are real-time communications channels that support voice or video communications. Some channels may be able to support both non-real-time messaging and real-time communications.
- servers can be configured to be public or private.
- a public server is one that any user can search for and request to join.
- a private server is one that a user needs to be invited to join. Depending on the configuration of the private server, a user can be invited by another user or may need to be invited by the administrator of the private server. Users can request to join a public or private server, and an entity with administrative privileges can grant the request.
- servers can be managed by the user account that created the server. Additionally, server administrators can delegate privileges to other user accounts to be administrators, and administrators can also create or invite bots 106 , such as a chatbot, to perform some administrative actions.
- server administrators can delegate privileges to other user accounts to be administrators, and administrators can also create or invite bots 106 , such as a chatbot, to perform some administrative actions.
- administrators can also set up various safety or content moderation policies.
- those policies are enforced by user accounts with the administrator role for the server.
- the policies can be enforced by software services provided by the community hosting service 102 , such as the Safety/moderation service 116 or bot 106 .
- servers are environments for supporting a community and are generally created around topics.
- servers can be configured to integrate content through embedded channels or webhooks.
- an administrator of a server might integrate a YOUTUBE channel, a TWITCH feed, or a TWITTER feed into one or more channels of the server when the content of those channels or feeds are relevant to the channel.
- a server can follow a channel offered by another server supported by the community hosting service 102 .
- user accounts that are members of a server can also use their instance of client application 104 to interact with the community hosting service 102 .
- the client application 104 can make requests of the community hosting service 102 to initiate a session with the community hosting service 102 and to access servers and channels to which the user account is a member, receive notifications and send messages, and otherwise communicate in the channels in which they belong.
- community hosting service 102 provides a variety of services that can be called by client application 104 or other services of the community hosting service 102 .
- the community hosting service 102 includes a servers/guilds service 124 .
- the servers/guilds service 124 can be used to create and administer a server. Additionally, the servers/guilds service 124 can also support various functions to those user accounts that are members of a server. For example, when an instance of client application 104 establishes a session using sessions service 120 , the sessions service 120 can interact with servers/guilds service 124 to provide information regarding the servers to which the user account belongs.
- the client application 104 can receive identifiers of all servers to which the user account operating the client device associated with client application 104 is a member. While the session is active, client application 104 can request updates regarding one or more of the servers to which the user account operating client application 104 belongs from servers/guilds service 124 .
- Community hosting service 102 also provides a safety/moderation service 116 .
- community hosting service 102 occasionally needs to deal with user accounts issuing spam or inappropriate content.
- administrators of servers can perform some moderation functions such as suspending user accounts on a particular server or banning user accounts or bots for inappropriate posts or for posting spam
- community hosting service 102 can have various software services that attempt to moderate some posts.
- safety/moderation service 116 can include algorithms designed to detect hate speech or other harmful or inappropriate content.
- Safety/moderation service 116 can also include algorithms configured to identify communications as spam or phishing.
- Safety/moderation service 116 can provide various functions to protect users from content posted in a channel and attacks on client application 104 or the computing device hosting client application 104 .
- Community hosting service 102 can also include a data analytics service 118 .
- the data analytics service 118 can provide various services in support of community hosting service 102 and in support of the users of community hosting service 102 .
- data analytics service 118 can monitor the performance of various features of the community hosting service 102 to determine whether updates to features are well received by the user community.
- the data analytics service 118 can also be used to develop and run various machine learning algorithms and other algorithms designed to identify harmful content, malicious servers, malicious user accounts, and malicious bots 106 .
- sessions service 120 is configured to authenticate a user account to community hosting service 102 . After a user account has been authenticated, the sessions service 120 can determine one or more servers to which the user account is a member or for which the user account is an administrator. The sessions service 120 can send a list of identifiers for the servers associated with the user account to the client application 104 . Thereafter, the client application 104 can request information regarding the servers by using a session token that validates that the client application 104 is operating in an authenticated session.
- the presence service 122 can be used to provide presence information regarding other members of a server or a channel to which the user account belongs. Through the presence service 122 , the client application can convey information about which user accounts are currently active in the server or channel. Likewise, the client application 104 can provide presence information for the user account controlling the instance of client application 104 .
- Community hosting service 102 can also include a real-time communications service 108 .
- the real-time communications service 108 is configured to support real-time communications such as live voice communications or video conferencing.
- the real-time communications service 108 can be a public Internet service located outside a gateway for community hosting service 102 .
- Real-time communications service 108 can provide real-time communications for channels configured to support real-time communications.
- Authentication service 126 may assist with receiving authentication (i.e., via OAuth 2) from a third-party application to receive a set of curated data, that is updated over time, pertaining to the third-party application user account.
- the authentication service 126 serves as a safety measures for the community hosting service 102 when facilitating real-world transactions, especially with regard to authenticating seller user accounts by giving buyer user accounts access to reliable information about the seller as well as restricting certain capabilities to authenticated sellers, as further described below.
- FIG. 1 also illustrates a bot 106 .
- the bot 106 can be created and configured by users of the community hosting service 102 and linked to servers chosen by the administrator.
- the bot 106 can be configured as a chatbot that can have some understanding of the human language through natural language processing technologies.
- the bot 106 can be configured to provide some content moderation functions and/or some administrative functions. For example, the bot 106 might be granted permission to invite new members, send messages in a channel, embed links, remove members, delete messages, mute members, and attach files, among other possible functions.
- bots 106 can have their own user account and are authenticated using a token. Bots 106 can have full access to all services of community hosting service 102 .
- community hosting service 102 is shown with just one of each service and database, it will be appreciated by those of ordinary skill in the art that community hosting service 102 can include many instances of each service or database, and in some embodiments, there can be different versions of the service or database that may utilize different technologies such as coding languages, database schemes, etc.
- the community hosting service 102 is configured such that the majority of communications between the community hosting service 102 and the client application 104 pass through API layer 110 .
- the client application 104 can request responses from various services provided by the community hosting service 102 from the API layer 110 . Additionally, services within the community hosting service 102 can communicate with each other by sending messages through the API layer 110 .
- the client application 104 can also interact with a real-time communications service 108 for voice and video communication services.
- FIG. 2 A illustrates an example of user interface 200 presented by client application 104 .
- User interface 200 includes icons for servers 202 .
- the top icon has been selected and represents the “hydration club” server.
- the title 206 of the selected server, the “hydration club,” is presented at the top of the user interface 200 .
- User interface 200 also includes a plurality of channels 218 that are part of the server hydration club server.
- One of the channels, entitled “tea drinkers” 212 is a non-real-time messaging channel.
- the message thread within the “tea drinkers” channel 214 can be shown within messaging pane 220 .
- the messaging pane 218 is configured to present content such as text messages, images, emojis, recorded voice or video files, attachments, etc.
- a user can provide content to be included in the channel using input interface 208 .
- User interface 200 also includes a selectable option 204 to add additional servers.
- User interface 200 also includes a user account icon and controls 210 .
- FIG. 2 B illustrates an example of user interface 200 presented by client application 104 .
- channel 214 for the channel entitled “sound of water” has been selected.
- the “sound of water” channel is a real-time communications channel.
- messaging pane 220 shows two user accounts engaged in real-time communications.
- the user account icon and controls 210 show that the user accounts microphone 224 is muted.
- the user account has options 222 to share their video or screen. The user account can also disconnect from the real-time communications using option 226 .
- FIG. 3 illustrates an example sequence diagram 300 for native access control handling based on curated data received through third-party authentication protocols, according to some examples of the present disclosure.
- the client application 104 may send a request ( 302 ) authentication for a user account to the community hosting service 102 .
- the authentication of the user account may link the user account with another user account associated with a third-party application sharing the same user.
- Communication with the third-party authentication server 304 may be handled by an external application programming interface (API) for executing an authentication protocol with the third-party application, following an OAuth 2.0 workflow. More specifically, the authentication may require a curated set of data from the third-party authentication server 304 that would “authenticate” the user account based on circumstantial and supportive evidence provided by the third-party authentication server 304 .
- API application programming interface
- the community hosting service 102 may connect ( 306 ) the third-party authentication server 304 with the client application 104 .
- the client application 104 may provide authentication credentials, such as a username and password, PIN, certificate, etc., to the third-party authentication server 304 .
- the third-party authentication server 304 may send ( 312 ) a token to the client application 104 .
- the client application 104 may, in turn, send ( 314 ) the token to the community hosting service 102 .
- the community hosting service 102 may then forward ( 316 ) the token to a resource server 318 associated with the third-party application.
- the resource server 318 may then send a set of curated data 320 to the community hosting service 102 .
- the community hosting service 102 may further determine whether or not the user account qualifies for a different access privilege. If so, the community hosting service 102 sets ( 322 ) the different access privileges for the user account.
- the community hosting service 102 may further send ( 324 ) the set of curated data to the client application 104 .
- the community hosting service 102 may store the set of curated data in a database along with other sets of curated data.
- the different access privileges may include one of the following: access to a particular channel, a new role designation that provides new associated access, and access to a voice channel, etc.
- FIG. 4 illustrates an example of a GUI 400 presenting sets of curated data in a profile 402 received from third-party applications in accordance with some aspects of the present technology.
- the profile 402 is associated with a user account and the profile 402 may include sets of curated data 404 accumulated from one or more third-party applications.
- the sets of curated data 404 may link to, for example, social media platforms and may indicate a number of followers 406 A or media platforms and may indicate a number of subscribers 406 B.
- the sets of curated data 404 may link to third-party marketplaces and may indicate a number of products for sale, number of sales, and/or admirers 408 .
- the sets of curated data 404 may link to a gaming platform and may indicate a total number of hours played for specific games 410 and/or characters/skins they own 412 .
- each set of curated data associated with a respective third-party application there may be a link 414 to a respective profile at the respective third-party application.
- the user account has the option to display or not display the sets of curated data on their profile. The user account may choose just to display their third-party username and the link 414 .
- the profile 402 may further include what roles the user account has, wherein certain roles that have been authenticated based on the sets of curated data are designated differently (e.g., with a check mark) indicating that they have been authenticated for that role, which may further provide different access privileges in certain servers and/or channels.
- FIG. 5 illustrates an example of a GUI 500 presenting a customization control modal 502 for creating custom filtered access to native privileges based on data from third-party applications in accordance with some aspects of the present technology.
- administrators may be provided the option to customize the set of curated data that is received from the third-party application.
- the customization gives administrators a more granular way to specify how they want to either present information on a profile or set access privileges. Giving the administrators the option to customize their own settings alleviates any burden on the community hosting service to provide all the various ways the administrator would want to customize their settings.
- the customization control modal 502 may be presented to administrators to create custom filtered access to native privileges based on data from third-party applications.
- the administrator may be provided an option 504 to choose which third-party application the set of curated data is being received from.
- the administrator may choose and/or scenarios between two third-party applications, whereby the third-party user accounts need to pass both set requirements or either of the requirements.
- the administrator may further add more third-party applications 507 to add more requirements.
- an account age 508 A of the third-party user account must be at least a certain number of days old.
- the administrator may enter in a field 506 that is associated with numerical quantifications. Additional examples may include that the requirement may be that the third-party user account has a certain role 508 B, have a certain number of followers 508 C, and/or have posted a certain amount 508 D.
- the administrator may be provided an option to toggle 510 each individual requirement on or off as they see fit.
- Specific requirements may be set out by the community hosting service 102 or added by the administrator or a developer.
- the developer may attach a bot 106 that may provide an application programming interface (API) that pulls a custom set of curated data, and the elevated permissions status may be provided based on the pulled custom set of curated data.
- API application programming interface
- the permissions status may just be to be able to show the set of curated data in the profile.
- FIG. 6 illustrates an example of a GUI 600 presenting a sale post based on a set of curated data originating from a third-party application, the sale post posted directly in a channel in which users can directly purchase, in accordance with some aspects of the present technology.
- the channel 602 may be a general channel as shown in FIG. 6 or may be in a restricted channel that only allows users that have a specific access privilege to post or even view. By commenting in the channel, the seller can notify potential buyers of a new sale to be aware of. In addition, the seller may set up a storefront that includes all of their products so that users can browse all the different listings. From the storefront interface, the seller may choose the sale post 604 to be posted in the channel. Furthermore, the generated online sale may route through the third-party application or be its own separate online sale through the community hosting service 102 . In addition, the listing may be created natively and may also cross-post listing from third-party sites, such as GOAT, OpenSea, etc.
- the sale post 604 may include a “buy now” button 606 , or an “add to cart” button.
- the sale post 604 may be generated from a set of curated data from the respective third-party application, such as a third-party marketplace.
- the sale post 604 may include the name of the third-party marketplace, a rating and/or a link to reviews 608 at the respective store at the third-party marketplace.
- the sale post 604 may further include a rating 610 of the user account at the community hosting service 102 .
- FIG. 7 illustrates an example flowchart diagram for native access control handling based on curated data received through third-party authentication protocols in accordance with some aspects of the present technology.
- the example method 700 depicts a particular sequence of operations, the sequence may be altered without departing from the scope of the present disclosure. For example, some of the operations depicted may be performed in parallel or in a different sequence that does not materially affect the function of the method 700 . In other examples, different components of an example device or system that implements the method 700 may perform functions at substantially the same time or in a specific sequence.
- the method 700 includes receiving, from a client application associated with a user account, a request to connect to a third-party user account associated with a third-party application with a user account that is a member of a server that supports near real-time communications through the client application at block 702 .
- the authentication service 126 illustrated in FIG. 1
- the request may specifically be for obtaining the access privilege.
- the access privilege may allow the user account to perform one or more actions in the server.
- the access privilege may provide access to a channel that requires all members to have the access privilege.
- the access privilege may be a removal of rights. For example, access may be filtered based off the set of curated data.
- the method 700 includes determining a third-party authentication protocol associated with the third-party application at block 704 .
- the authentication service 126 illustrated in FIG. 1
- the third-party authentication protocol may be an OAuth 2 workflow.
- the method 700 includes receiving authorization to access a third-party user account using the third-party authentication protocol, at block 706 .
- the authentication service 126 illustrated in FIG. 1
- receiving authentication based on the third-party authentication protocol may include validating data from a public blockchain with connected wallets and signed messages.
- the method 700 includes receiving a set of curated data about the third-party user account based on the authentication, at block 708 .
- the authentication service 126 and/or the community hosting service 102 may receive the set of curated data about the third-party user account.
- the method 700 includes in response to the set of curated data passing a set of requirements, providing an access privilege to the user account in the server based on the received set of curated data at block 710 .
- the authentication service 126 and/or the community hosting service 102 may provide the access privilege.
- an administrator may require that in order for a member of a server to obtain a particular seller verified role, the member must have an authorized third-party user account that has sold over 10 items on a third-party marketplace.
- the set of curate data indicates that the authorized third-party user account that has sold over 10 items on a third-party marketplace
- the user account is granted the access privilege associated with the seller verified role.
- the access privilege may further include access to particular channels, the ability to do voice chat, or just an privilege that the community hosting service 102 provides.
- the method includes causing to display the set of curated data in a profile of the user account, wherein the profile includes an engageable link to the third-party application.
- the profile may include multiple sets of curated data associated with different third-party applications.
- the profile may further include any kind of defining quality associated with the third-party user account such as a rating, a follower or admirer count, a number of posts, a number of sales made, a number of sale posts, or a total of hours played in a game in the third-party application.
- analytics pertaining to how many user accounts in the server have the access privilege may be provided to the administrator and/or third parties, such as for brand deals. For example, brands would be interested in advertising in a channel that has been verified to include over a certain percentage of user that fall in their demographic.
- a sale post associated with a third-party sale post at the third-party application may be generated and inserted as a comment in a channel associated with the server. Furthermore, the sale post may be generated from the set of curated data. The sale transaction associated with the sale post may be performed at the community hosting service 102 , which saves time for the purchaser by removing the need to open the third-party application.
- the method includes receiving a customized setting for a second access privilege that requires passing a custom set of requirements by a custom set of curated data from the third-party application.
- the method may further include receiving the custom set of curated data from the third-party application and in response to passing the custom set of requirements, causing to display the custom set of curated data in the profile of the user account.
- the customized setting may be set by an administrator of a server that changes from a default setting. In order to do so, a customization modal may be displayed in a client application associated with an administrator account whereby the customization modal provides a means for customizing what data to be extracted resulting in the custom set of curated data.
- the customization includes a field to include a numerical quantity associated with one of the requirements.
- a bot 106 may be attached to the server and the bot may enable customization for receiving a custom set of curated data.
- the bot may provide an application programming interface (API) that receives the custom set of curated data pushed from the third-party application.
- API application programming interface
- non-customized sets of curated data are pulled from the respective third-party applications.
- a bot 106 may be used to enable customization for receiving a custom set of curated data for a particular server.
- Third-party applications that are not as widely used and may have data that only specific to that particular server, may be accessed via the bot 106 .
- the third-party application may be a social media platform that only serves a particular country, for example.
- FIG. 8 shows an example of computing system 800 , which can be for example any computing device making up client application 104 , community hosting service 102 , or any component thereof in which the components of the system are in communication with each other using connection 802 .
- Connection 802 can be a physical connection via a bus, or a direct connection into processor 804 , such as in a chipset architecture.
- Connection 802 can also be a virtual connection, networked connection, or logical connection.
- computing system 800 is a distributed system in which the functions described in this disclosure can be distributed within a datacenter, multiple data centers, a peer network, etc.
- one or more of the described system components represents many such components each performing some or all of the function for which the component is described.
- the components can be physical or virtual devices.
- Example computing system 800 includes at least one processing unit (CPU or processor) 804 and connection 802 that couples various system components including system memory 808 , such as read-only memory (ROM) 810 and random access memory (RAM) 812 to processor 804 .
- system memory 808 such as read-only memory (ROM) 810 and random access memory (RAM) 812 to processor 804 .
- Computing system 800 can include a cache of high-speed memory 806 connected directly with, in close proximity to, or integrated as part of processor 804 .
- Processor 804 can include any general purpose processor and a hardware service or software service, such as services 816 , 818 , and 820 stored in storage device 814 , configured to control processor 804 as well as a special-purpose processor where software instructions are incorporated into the actual processor design.
- Processor 804 may essentially be a completely self-contained computing system, containing multiple cores or processors, a bus, memory controller, cache, etc.
- a multi-core processor may be symmetric or asymmetric.
- computing system 800 includes an input device 826 , which can represent any number of input mechanisms, such as a microphone for speech, a touch-sensitive screen for gesture or graphical input, keyboard, mouse, motion input, speech, etc.
- Computing system 800 can also include output device 822 , which can be one or more of a number of output mechanisms known to those of skill in the art.
- output device 822 can be one or more of a number of output mechanisms known to those of skill in the art.
- multimodal systems can enable a user to provide multiple types of input/output to communicate with computing system 800 .
- Computing system 800 can include communication interface 824 , which can generally govern and manage the user input and system output. There is no restriction on operating on any particular hardware arrangement, and therefore the basic features here may easily be substituted for improved hardware or firmware arrangements as they are developed.
- Storage device 814 can be a non-volatile memory device and can be a hard disk or other types of computer readable media which can store data that are accessible by a computer, such as magnetic cassettes, flash memory cards, solid state memory devices, digital versatile disks, cartridges, random access memories (RAMs), read-only memory (ROM), and/or some combination of these devices.
- a computer such as magnetic cassettes, flash memory cards, solid state memory devices, digital versatile disks, cartridges, random access memories (RAMs), read-only memory (ROM), and/or some combination of these devices.
- the storage device 814 can include software services, servers, services, etc., that when the code that defines such software is executed by the processor 804 , it causes the system to perform a function.
- a hardware service that performs a particular function can include the software component stored in a computer-readable medium in connection with the necessary hardware components, such as processor 804 , connection 802 , output device 822 , etc., to carry out the function.
- the present technology may be presented as including individual functional blocks including functional blocks comprising devices, device components, steps or routines in a method embodied in software, or combinations of hardware and software.
- a service can be software that resides in memory of a client device and/or one or more servers of a content management system and perform one or more functions when a processor executes the software associated with the service.
- a service is a program or a collection of programs that carry out a specific function.
- a service can be considered a server.
- the memory can be a non-transitory computer-readable medium.
- the computer-readable storage devices, mediums, and memories can include a cable or wireless signal containing a bit stream and the like.
- non-transitory computer-readable storage media expressly exclude media such as energy, carrier signals, electromagnetic waves, and signals per se.
- Such instructions can comprise, for example, instructions and data which cause or otherwise configure a general purpose computer, special purpose computer, or special purpose processing device to perform a certain function or group of functions. Portions of computer resources used can be accessible over a network.
- the executable computer instructions may be, for example, binaries, intermediate format instructions such as assembly language, firmware, or source code. Examples of computer-readable media that may be used to store instructions, information used, and/or information created during methods according to described examples include magnetic or optical disks, solid-state memory devices, flash memory, USB devices provided with non-volatile memory, networked storage devices, and so on.
- Devices implementing methods according to these disclosures can comprise hardware, firmware and/or software, and can take any of a variety of form factors. Typical examples of such form factors include servers, laptops, smartphones, small form factor personal computers, personal digital assistants, and so on.
- the functionality described herein also can be embodied in peripherals or add-in cards. Such functionality can also be implemented on a circuit board among different chips or different processes executing in a single device, by way of further example.
- the instructions, media for conveying such instructions, computing resources for executing them, and other structures for supporting such computing resources are means for providing the functions described in these disclosures.
- Illustrative examples of the disclosure include:
- a computer-implemented method comprising: receiving, from a client application associated with a user account, a request to connect to a third-party user account associated with a third-party application with the user account that is a member of a server that supports near real-time communications through the client application; determining a third-party authentication protocol associated with the third-party application; receiving authorization to access a third-party user account using the third-party authentication protocol; receiving a set of curated data about the third-party user account from the third-party authentication protocol; and in response to the set of curated data passing a set of requirements, providing an access privilege to the user account in the server based on the received set of curated data.
- Aspect 2 The computer-implemented method of Aspect 1, further comprising: causing to display the set of curated data in a profile of the user account, wherein the profile includes an engagable link to the third-party application.
- Aspect 3 The computer-implemented method of any of Aspects 1 to 2, further comprising: presenting a rating, a follower or admirer count, a number of posts, a number of sales made, a number of sale posts, or a total of hours played in a game in the third-party application in the profile.
- Aspect 4 The computer-implemented method of any of Aspects 1 to 3, further comprising: receiving a customized setting for a second access privilege that requires passing a custom set of requirements by a custom set of curated data from the third-party application; receiving the custom set of curated data from the third-party application; and in response to passing the custom set of requirements, causing to display the custom set of curated data in the profile of the user account.
- Aspect 5 The computer-implemented method of any of Aspects 1 to 4, further comprising: causing to display a customization modal that provides a means for customizing what data to be extracted resulting in the custom set of curated data, wherein the customization includes a field to include a numerical quantity associated with one of the requirements.
- Aspect 6 The computer-implemented method of any of Aspects 1 to 5, further comprising: attaching a bot to the server, wherein the bot provides an application programming interface (API) that receives the custom set of curated data pushed from the third-party application.
- API application programming interface
- Aspect 7 The computer-implemented method of any of Aspects 1 to 6, wherein the request is for obtaining the access privilege, and wherein the access privilege allows the user account to perform one or more actions in the server.
- Aspect 8 The computer-implemented method of any of Aspects 1 to 7, wherein the access privilege provides access to a channel that requires all members to have the access privilege.
- Aspect 9 The computer-implemented method of any of Aspects 1 to 8, further comprising: providing analytics pertaining to how many user accounts in the server have the access privilege.
- Aspect 10 The computer-implemented method of any of Aspects 1 to 9, further comprising: generating a sale post associated with a third-party sale post at the third-party application; and inserting the sale post as a comment in a channel associated with the server.
- Aspect 11 The computer-implemented method of any of Aspects 1 to 10, wherein the sale post is generated from the set of curated data.
- Aspect 12 The computer-implemented method of any of Aspects 1 to 11, wherein the receiving authentication based on the third-party authentication protocol includes validating data from a public blockchain with connected wallets and signed messages.
- a non-transitory computer-readable medium comprising instructions, the instructions, when executed by a computing system, causes the computing system to: receive, from a client application associated with a user account, a request to connect to a third-party user account associated with a third-party application with the user account that is a member of a server that supports near real-time communications through the client application; determine a third-party authentication protocol associated with the third-party application; receive authorization to access a third-party user account using the third-party authentication protocol; receive a set of curated data about the third-party user account based on the authentication; and in response to the set of curated data passing a set of requirements, provide an access privilege to the user account in the server based on the received set of curated data.
- Aspect 14 The non-transitory computer-readable medium of Aspect 13, wherein the instructions, when executed by the computing system, causes the computing system to: cause to display the set of curated data in a profile of the user account, wherein the profile includes an engagable link to the third-party application.
- Aspect 15 The non-transitory computer-readable medium of any of Aspects 13 to 14, wherein the instructions, when executed by the computing system, causes the computing system to: present a rating, a follower or admirer count, a number of posts, a number of sales made, a number of sale posts, or a total of hours played in a game in the third-party application in the profile.
- Aspect 16 The non-transitory computer-readable medium of any of Aspects 13 to 15, wherein the instructions, when executed by the computing system, causes the computing system to: receive a customized setting for a second access privilege that requires passing a custom set of requirements by a custom set of curated data from the third-party application; receive the custom set of curated data from the third-party application; and in response to passing the custom set of requirements, cause to display the custom set of curated data in the profile of the user account.
- Aspect 17 The non-transitory computer-readable medium of any of Aspects 13 to 16, wherein the instructions, when executed by the computing system, causes the computing system to: causing to display a customization modal that provides a means for customizing what data to be extracted resulting in the custom set of curated data, wherein the customization includes a field to include a numerical quantity associated with one of the requirements.
- Aspect 18 The non-transitory computer-readable medium of any of Aspects 13 to 17, wherein the instructions, when executed by the computing system, causes the computing system to: attaching a bot to the server, wherein the bot provides an application programming interface (API) that receives the custom set of curated data pushed from the third-party application.
- API application programming interface
- a system comprising: one or more processors; and a non-transitory computer-readable medium comprising instructions, the instructions, when executed by the one or more processors, causes the one or more processors to: receive, from a client application associated with a user account, a request to connect to a third-party user account associated with a third-party application with the user account that is a member of a server that supports near real-time communications through the client application; determine a third-party authentication protocol associated with the third-party application; receive authorization to access a third-party user account using the third-party authentication protocol; receive a set of curated data about the third-party user account based on the authentication; and in response to the set of curated data passing a set of requirements, provide an access privilege to the user account in the server based on the received set of curated data.
- Aspect 20 The system of Aspect 19, wherein the instructions, when executed by the one or more processors, causes the one or more processors to: causing to display the set of curated data in a profile of the user account, wherein the profile includes an engagable link to the third-party application.
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Computing Systems (AREA)
- Human Resources & Organizations (AREA)
- Strategic Management (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Marketing (AREA)
- General Physics & Mathematics (AREA)
- Economics (AREA)
- Entrepreneurship & Innovation (AREA)
- Theoretical Computer Science (AREA)
- Tourism & Hospitality (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Data Mining & Analysis (AREA)
- Primary Health Care (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The present technology provides native access control handling based on curated data received through third-party authentication protocols. Authentication of a user account is based on a set of curated data received from a third-party application with respect to a third-party application user account shared by a same user. The user account is a member of a server that supports near real-time communications through a client application associated with the user account. The set of curated data is received in response to receiving authentication based on a third-party authentication protocol associated with the third-party application. The curated set of data can be displayed in a profile of the user account as well as for providing an access privilege to the user account in the server.
Description
- Some social networks are developed around friendships, professional relationships, or other individual connections, and some social networks create communities around topics. Often social networking platforms provide services through which users can form or interact within a social network. Users can generally post comments or other content, make connections, add links, or simply browse content created by others. Some social networks have moderators that moderate the content in their respective social networks or online communities. While social networks can provide entertainment, networking, commercial, or informational value, they are also subject to various challenges. For social networks that allow users to conduct buying, selling, or trading goods, there needs to be a level of safety and trust that is established to avoid fraudulent transactions. That same level of trust and candidness can also be applied in non-trade-related circumstances across the social networking platforms as well.
- In order to describe the manner in which the above-recited and other advantages and features of the disclosure can be obtained, a more particular description of the principles briefly described above will be rendered by reference to specific embodiments thereof, which are illustrated in the appended drawings. Understanding that these drawings depict only exemplary embodiments of the disclosure and are not, therefore, to be considered to be limiting of its scope, the principles herein are described and explained with additional specificity and detail through the use of the accompanying drawings in which:
-
FIG. 1 illustrates an example system that is configured to support user accounts in creating, managing, and participating in online communities in accordance with some aspects of the present technology. -
FIG. 2A illustrates an example of a user interface presented by a client application in accordance with some aspects of the present technology. -
FIG. 2B illustrates an example of a user interface presented by a client application in accordance with some aspects of the present technology. -
FIG. 3 illustrates an example sequence diagram for native access control handling based on curated data received through third-party authentication protocols in accordance with some aspects of the present technology. -
FIG. 4 illustrates an example of a graphical user interface (GUI) presenting a set of curated data in a profile received from third-party applications in accordance with some aspects of the present technology. -
FIG. 5 illustrates an example of a GUI presenting a customization control modal for creating custom filtered access to native privileges based on data from third-party applications in accordance with some aspects of the present technology. -
FIG. 6 illustrates an example of aGUI 600 presenting a sale post based on a set of curated data originating from a third-party application, the sale post posted directly in a channel in which users can directly purchase, in accordance with some aspects of the present technology. -
FIG. 7 illustrates an example flowchart diagram for native access control handling based on curated data received through third-party authentication protocols in accordance with some aspects of the present technology. -
FIG. 8 shows an example of a system for implementing certain aspects of the present technology. - Various embodiments of the disclosure are discussed in detail below. While specific implementations are discussed, it should be understood that this is done for illustration purposes only. A person skilled in the relevant art will recognize that other components and configurations may be used without parting from the spirit and scope of the disclosure.
- Additional features and advantages of the disclosure will be set forth in the description which follows, and in part will be obvious from the description, or can be learned by practice of the herein disclosed principles. The features and advantages of the disclosure can be realized and obtained by means of the instruments and combinations particularly pointed out in the appended claims. These and other features of the disclosure will become more fully apparent from the following description and appended claims, or can be learned by the practice of the principles set forth herein.
- The disclosed technology addresses the need in the art for safety measures for a community hosting service that facilitate real-world transactions, especially with regard to authenticating seller user accounts by giving buyer user accounts access to reliable information about the seller as well as restricting certain capabilities to authenticated sellers. By linking the seller's user account with the seller's other accounts on third-party applications, not only are buyers assured that the seller is who they say they are, but posting on channels can also be restricted to authenticated sellers, reducing instances of fraud and spam.
- As described herein, one aspect of the present technology is to receive authentication (i.e., via OAuth 2) from a third-party application to receive a set of curated data that is updated over time, pertaining to a third-party application user account. The third-party application user account is the seller's account at the third-party application. Once authentication is provided, the community hosting service is given permission to receive the set of curated data. For example, the data may pertain to a number of sales that the third-party application user account had over the past year. This information may then be used to either give the user account certain permissions, such as permissions to sell on the channel, and/or may be displayed on a profile of the user account.
- By bringing on external data and statistics, such as a rating, a follower or admirer count, a number of posts, a number of sales made, a number of sale posts, or a total of hours played in a game in the third-party application, into the profile, other users can use such information and have more trust in the user account. Users may import the external data to be displayed in their profile as a way to gain respect or to just showcase more about themselves.
- In some cases, administrators may be provided the option to customize the set of curated data that is received from the third-party application. The customization gives administrators a more granular way to specify how they want to either present information on a profile or set access privileges. Giving the administrators the option to customize their own settings alleviates any burden on the community hosting service to provide all the various ways the administrator would want to customize their settings.
- More specifically, for some community hosting services in which identity of the user behind the user account is not really important for the purposes of communicating in various servers or channels, “authenticating” a user may go beyond just serving transaction-based purposes. The set of curated data from the third-party application may be used in various ways to set the parameters of native access and control. For example, administrators of servers may require that users must have had a certain level of experience in certain games in order to join a channel or send certain messages in the channel. As another example, users may be required or suggested to link to particular third-party applications such that analytics may be performed to better understand the makeup of the users in a particular server (i.e., what percentage of the users are influencers on other applications or what percentage of users have played a certain game) as data for attracting targeted brand deals.
- Although the present disclosure broadly covers the use of personal information data to implement one or more various disclosed embodiments, the present disclosure also contemplates that the various embodiments can also be implemented without the need for accessing such personal information data. That is, the various embodiments of the present technology are not rendered inoperable due to the lack of all or a portion of such personal information data. For example, content can be selected and delivered to users by inferring preferences based on non-personal information data or a bare minimum amount of personal information, such as the content being requested by the device associated with a user, other non-personal information available to the content delivery services, or publicly available information.
-
FIG. 1 illustrates anexample system 100 configured to support user accounts in creating, managing and participating in online communities. In particular, thesystem 100 supports a plurality of user accounts interacting with each other in communities to which they belong. - The
system 100 illustrates an example architecture in which users of user accounts interact through an instance ofclient application 104 operating on a computing device. Theclient application 104 can be provided by a webpage rendered in a web browser or a downloaded client application executed by an operating system of the computing device. In some embodiments, some disparate collections of features or functionality might be available inclient application 104 depending on the capabilities of the environment executing or rendering theclient application 104. - The
system 100 also includes acommunity hosting service 102, which provides an infrastructure for supporting the plurality of user accounts interacting with each other in communities to which they belong. Thecommunity hosting service 102 can be a distributed service hosted in a cloud computing architecture. Thecommunity hosting service 102 is responsible for hosting various services accessible to the user accounts by theclient application 104. - In some embodiments, the
community hosting service 102 provides a servers/guilds service 124 to enable user accounts to set up a server (also referred to as a guild) to host members interacting around one or more channels. A server (or guild) is a user-created environment supporting a community. A server is generally configured with one or more channels which are generally created around topics or sub-topics, or groups of people, and can support exchanges of communications between user accounts. Some channels are non-real-time channels where users communicate through written messages, images, emojis, recorded voice or video files, attachments, etc. Some channels are real-time communications channels that support voice or video communications. Some channels may be able to support both non-real-time messaging and real-time communications. - A user account can operate their instance of the
client application 104 to create a server at thecommunity hosting service 102. In some embodiments, this will be performed by theclient application 104 calling theAPI layer 110 requesting to create a new server. TheAPI layer 110 can then interact with servers/guilds service 124 to create the server by providing the server with a unique identifier and associating various configurations requested by the user account. Once the server is created, the user account that created the server can be considered the owner and/or admin for the server. The servers/guilds service 124 can record the information about the server usingdata service 112 to store information about the server indatabase 114. - In some embodiments, servers can be configured to be public or private. A public server is one that any user can search for and request to join. A private server is one that a user needs to be invited to join. Depending on the configuration of the private server, a user can be invited by another user or may need to be invited by the administrator of the private server. Users can request to join a public or private server, and an entity with administrative privileges can grant the request.
- In some embodiments, servers can be managed by the user account that created the server. Additionally, server administrators can delegate privileges to other user accounts to be administrators, and administrators can also create or invite
bots 106, such as a chatbot, to perform some administrative actions. - In addition to approving user accounts to join a server, administrators can also set up various safety or content moderation policies. In some embodiments, those policies are enforced by user accounts with the administrator role for the server. In some embodiments, the policies can be enforced by software services provided by the
community hosting service 102, such as the Safety/moderation service 116 orbot 106. - As introduced above, servers are environments for supporting a community and are generally created around topics. In furtherance of that function, servers can be configured to integrate content through embedded channels or webhooks. For example, an administrator of a server might integrate a YOUTUBE channel, a TWITCH feed, or a TWITTER feed into one or more channels of the server when the content of those channels or feeds are relevant to the channel. In some embodiments, a server can follow a channel offered by another server supported by the
community hosting service 102. - In addition to hosts, user accounts that are members of a server can also use their instance of
client application 104 to interact with thecommunity hosting service 102. Theclient application 104 can make requests of thecommunity hosting service 102 to initiate a session with thecommunity hosting service 102 and to access servers and channels to which the user account is a member, receive notifications and send messages, and otherwise communicate in the channels in which they belong. - As illustrated in
FIG. 1 ,community hosting service 102 provides a variety of services that can be called byclient application 104 or other services of thecommunity hosting service 102. - For example, the
community hosting service 102 includes a servers/guilds service 124. The servers/guilds service 124, as described above, can be used to create and administer a server. Additionally, the servers/guilds service 124 can also support various functions to those user accounts that are members of a server. For example, when an instance ofclient application 104 establishes a session usingsessions service 120, thesessions service 120 can interact with servers/guilds service 124 to provide information regarding the servers to which the user account belongs. Theclient application 104 can receive identifiers of all servers to which the user account operating the client device associated withclient application 104 is a member. While the session is active,client application 104 can request updates regarding one or more of the servers to which the user account operatingclient application 104 belongs from servers/guilds service 124. -
Community hosting service 102 also provides a safety/moderation service 116. As with any online community,community hosting service 102 occasionally needs to deal with user accounts issuing spam or inappropriate content. While administrators of servers can perform some moderation functions such as suspending user accounts on a particular server or banning user accounts or bots for inappropriate posts or for posting spam,community hosting service 102 can have various software services that attempt to moderate some posts. For example, safety/moderation service 116 can include algorithms designed to detect hate speech or other harmful or inappropriate content. Safety/moderation service 116 can also include algorithms configured to identify communications as spam or phishing. Safety/moderation service 116 can provide various functions to protect users from content posted in a channel and attacks onclient application 104 or the computing device hostingclient application 104. -
Community hosting service 102 can also include adata analytics service 118. Thedata analytics service 118 can provide various services in support ofcommunity hosting service 102 and in support of the users ofcommunity hosting service 102. For example,data analytics service 118 can monitor the performance of various features of thecommunity hosting service 102 to determine whether updates to features are well received by the user community. Thedata analytics service 118 can also be used to develop and run various machine learning algorithms and other algorithms designed to identify harmful content, malicious servers, malicious user accounts, andmalicious bots 106. - As introduced above,
sessions service 120 is configured to authenticate a user account tocommunity hosting service 102. After a user account has been authenticated, thesessions service 120 can determine one or more servers to which the user account is a member or for which the user account is an administrator. Thesessions service 120 can send a list of identifiers for the servers associated with the user account to theclient application 104. Thereafter, theclient application 104 can request information regarding the servers by using a session token that validates that theclient application 104 is operating in an authenticated session. - The
presence service 122 can be used to provide presence information regarding other members of a server or a channel to which the user account belongs. Through thepresence service 122, the client application can convey information about which user accounts are currently active in the server or channel. Likewise, theclient application 104 can provide presence information for the user account controlling the instance ofclient application 104. -
Community hosting service 102 can also include a real-time communications service 108. The real-time communications service 108 is configured to support real-time communications such as live voice communications or video conferencing. In some embodiments, the real-time communications service 108 can be a public Internet service located outside a gateway forcommunity hosting service 102. Real-time communications service 108 can provide real-time communications for channels configured to support real-time communications. -
Authentication service 126 may assist with receiving authentication (i.e., via OAuth 2) from a third-party application to receive a set of curated data, that is updated over time, pertaining to the third-party application user account. Theauthentication service 126 serves as a safety measures for thecommunity hosting service 102 when facilitating real-world transactions, especially with regard to authenticating seller user accounts by giving buyer user accounts access to reliable information about the seller as well as restricting certain capabilities to authenticated sellers, as further described below. -
FIG. 1 also illustrates abot 106. Thebot 106 can be created and configured by users of thecommunity hosting service 102 and linked to servers chosen by the administrator. In some embodiments, thebot 106 can be configured as a chatbot that can have some understanding of the human language through natural language processing technologies. Thebot 106 can be configured to provide some content moderation functions and/or some administrative functions. For example, thebot 106 might be granted permission to invite new members, send messages in a channel, embed links, remove members, delete messages, mute members, and attach files, among other possible functions. In some embodiments,bots 106 can have their own user account and are authenticated using a token.Bots 106 can have full access to all services ofcommunity hosting service 102. - While the
community hosting service 102 is shown with just one of each service and database, it will be appreciated by those of ordinary skill in the art thatcommunity hosting service 102 can include many instances of each service or database, and in some embodiments, there can be different versions of the service or database that may utilize different technologies such as coding languages, database schemes, etc. - In some embodiments, the
community hosting service 102 is configured such that the majority of communications between thecommunity hosting service 102 and theclient application 104 pass throughAPI layer 110. Theclient application 104 can request responses from various services provided by thecommunity hosting service 102 from theAPI layer 110. Additionally, services within thecommunity hosting service 102 can communicate with each other by sending messages through theAPI layer 110. Theclient application 104 can also interact with a real-time communications service 108 for voice and video communication services. Although thecommunity hosting service 102 is be described with respect to a particular system architecture and communication flow, it will be appreciated by those of ordinary skill in the art that other system configurations are possible. -
FIG. 2A illustrates an example ofuser interface 200 presented byclient application 104. -
User interface 200 includes icons forservers 202. The top icon has been selected and represents the “hydration club” server. Thetitle 206 of the selected server, the “hydration club,” is presented at the top of theuser interface 200.User interface 200 also includes a plurality ofchannels 218 that are part of the server hydration club server. One of the channels, entitled “tea drinkers” 212 is a non-real-time messaging channel. The message thread within the “tea drinkers”channel 214 can be shown withinmessaging pane 220. As illustrated inFIG. 2A , themessaging pane 218 is configured to present content such as text messages, images, emojis, recorded voice or video files, attachments, etc. A user can provide content to be included in the channel usinginput interface 208. -
User interface 200 also includes aselectable option 204 to add additional servers.User interface 200 also includes a user account icon and controls 210. -
FIG. 2B illustrates an example ofuser interface 200 presented byclient application 104. InFIG. 2 B channel 214 for the channel entitled “sound of water” has been selected. The “sound of water” channel is a real-time communications channel. Accordingly,messaging pane 220 shows two user accounts engaged in real-time communications. As illustrated inFIG. 2B , the user account icon and controls 210 show that the user accountsmicrophone 224 is muted. Additionally, the user account hasoptions 222 to share their video or screen. The user account can also disconnect from the real-timecommunications using option 226. -
FIG. 3 illustrates an example sequence diagram 300 for native access control handling based on curated data received through third-party authentication protocols, according to some examples of the present disclosure. - The
client application 104 may send a request (302) authentication for a user account to thecommunity hosting service 102. The authentication of the user account may link the user account with another user account associated with a third-party application sharing the same user. Communication with the third-party authentication server 304 may be handled by an external application programming interface (API) for executing an authentication protocol with the third-party application, following an OAuth 2.0 workflow. More specifically, the authentication may require a curated set of data from the third-party authentication server 304 that would “authenticate” the user account based on circumstantial and supportive evidence provided by the third-party authentication server 304. - In response to the request, the
community hosting service 102 may connect (306) the third-party authentication server 304 with theclient application 104. Theclient application 104 may provide authentication credentials, such as a username and password, PIN, certificate, etc., to the third-party authentication server 304. Once authentication is complete (310), the third-party authentication server 304 may send (312) a token to theclient application 104. Theclient application 104 may, in turn, send (314) the token to thecommunity hosting service 102. - The
community hosting service 102 may then forward (316) the token to aresource server 318 associated with the third-party application. Theresource server 318 may then send a set ofcurated data 320 to thecommunity hosting service 102. Thecommunity hosting service 102 may further determine whether or not the user account qualifies for a different access privilege. If so, thecommunity hosting service 102 sets (322) the different access privileges for the user account. Thecommunity hosting service 102 may further send (324) the set of curated data to theclient application 104. In addition, thecommunity hosting service 102 may store the set of curated data in a database along with other sets of curated data. The different access privileges may include one of the following: access to a particular channel, a new role designation that provides new associated access, and access to a voice channel, etc. -
FIG. 4 illustrates an example of aGUI 400 presenting sets of curated data in aprofile 402 received from third-party applications in accordance with some aspects of the present technology. - The
profile 402 is associated with a user account and theprofile 402 may include sets ofcurated data 404 accumulated from one or more third-party applications. The sets ofcurated data 404 may link to, for example, social media platforms and may indicate a number offollowers 406A or media platforms and may indicate a number ofsubscribers 406B. The sets ofcurated data 404 may link to third-party marketplaces and may indicate a number of products for sale, number of sales, and/oradmirers 408. In addition, the sets ofcurated data 404 may link to a gaming platform and may indicate a total number of hours played forspecific games 410 and/or characters/skins they own 412. - By bringing on external data and statistics, such as a rating, a follower or admirer count, a number of posts, a number of sales made, a number of sale posts, or a total of hours played in a game in the third-party application, into the profile, other users can use such information and have more trust in the user account. Users may import the external data to be displayed in their profile as a way to gain respect or to just showcase more about themselves.
- For each set of curated data associated with a respective third-party application, there may be a
link 414 to a respective profile at the respective third-party application. Furthermore, once thecommunity hosting service 102 has received the sets of curated data, the user account has the option to display or not display the sets of curated data on their profile. The user account may choose just to display their third-party username and thelink 414. - The
profile 402 may further include what roles the user account has, wherein certain roles that have been authenticated based on the sets of curated data are designated differently (e.g., with a check mark) indicating that they have been authenticated for that role, which may further provide different access privileges in certain servers and/or channels. -
FIG. 5 illustrates an example of aGUI 500 presenting acustomization control modal 502 for creating custom filtered access to native privileges based on data from third-party applications in accordance with some aspects of the present technology. In some cases, administrators may be provided the option to customize the set of curated data that is received from the third-party application. The customization gives administrators a more granular way to specify how they want to either present information on a profile or set access privileges. Giving the administrators the option to customize their own settings alleviates any burden on the community hosting service to provide all the various ways the administrator would want to customize their settings. - To provide administrators with a wider range of options and without placing a burden on the
community hosting service 102, thecustomization control modal 502 may be presented to administrators to create custom filtered access to native privileges based on data from third-party applications. The administrator may be provided anoption 504 to choose which third-party application the set of curated data is being received from. In some cases, the administrator may choose and/or scenarios between two third-party applications, whereby the third-party user accounts need to pass both set requirements or either of the requirements. The administrator may further add more third-party applications 507 to add more requirements. - With respect to the requirements, they may include, for example, that an
account age 508A of the third-party user account must be at least a certain number of days old. For customization, the administrator may enter in afield 506 that is associated with numerical quantifications. Additional examples may include that the requirement may be that the third-party user account has acertain role 508B, have a certain number of followers 508C, and/or have posted acertain amount 508D. In addition, the administrator may be provided an option to toggle 510 each individual requirement on or off as they see fit. - Specific requirements may be set out by the
community hosting service 102 or added by the administrator or a developer. For cases in which the developer wants to set up a custom set of requirements, the developer may attach abot 106 that may provide an application programming interface (API) that pulls a custom set of curated data, and the elevated permissions status may be provided based on the pulled custom set of curated data. In such a case, the permissions status may just be to be able to show the set of curated data in the profile. -
FIG. 6 illustrates an example of aGUI 600 presenting a sale post based on a set of curated data originating from a third-party application, the sale post posted directly in a channel in which users can directly purchase, in accordance with some aspects of the present technology. - The
channel 602 may be a general channel as shown inFIG. 6 or may be in a restricted channel that only allows users that have a specific access privilege to post or even view. By commenting in the channel, the seller can notify potential buyers of a new sale to be aware of. In addition, the seller may set up a storefront that includes all of their products so that users can browse all the different listings. From the storefront interface, the seller may choose thesale post 604 to be posted in the channel. Furthermore, the generated online sale may route through the third-party application or be its own separate online sale through thecommunity hosting service 102. In addition, the listing may be created natively and may also cross-post listing from third-party sites, such as GOAT, OpenSea, etc. - The
sale post 604 may include a “buy now”button 606, or an “add to cart” button. Thesale post 604 may be generated from a set of curated data from the respective third-party application, such as a third-party marketplace. Thesale post 604 may include the name of the third-party marketplace, a rating and/or a link toreviews 608 at the respective store at the third-party marketplace. Thesale post 604 may further include arating 610 of the user account at thecommunity hosting service 102. -
FIG. 7 illustrates an example flowchart diagram for native access control handling based on curated data received through third-party authentication protocols in accordance with some aspects of the present technology. Although theexample method 700 depicts a particular sequence of operations, the sequence may be altered without departing from the scope of the present disclosure. For example, some of the operations depicted may be performed in parallel or in a different sequence that does not materially affect the function of themethod 700. In other examples, different components of an example device or system that implements themethod 700 may perform functions at substantially the same time or in a specific sequence. - According to some examples, the
method 700 includes receiving, from a client application associated with a user account, a request to connect to a third-party user account associated with a third-party application with a user account that is a member of a server that supports near real-time communications through the client application at block 702. For example, theauthentication service 126, illustrated inFIG. 1 , may receive the request to connect to the third-party user account. The request may specifically be for obtaining the access privilege. The access privilege may allow the user account to perform one or more actions in the server. Furthermore, the access privilege may provide access to a channel that requires all members to have the access privilege. In addition, the access privilege may be a removal of rights. For example, access may be filtered based off the set of curated data. - According to some examples, the
method 700 includes determining a third-party authentication protocol associated with the third-party application atblock 704. For example, theauthentication service 126, illustrated inFIG. 1 , may determine a third-party authentication protocol associated with the third-party application. For example, the third-party authentication protocol may be anOAuth 2 workflow. According to some examples, themethod 700 includes receiving authorization to access a third-party user account using the third-party authentication protocol, atblock 706. For example, theauthentication service 126, illustrated inFIG. 1 , may receive authorization to access the third-party user account. Furthermore, receiving authentication based on the third-party authentication protocol may include validating data from a public blockchain with connected wallets and signed messages. - According to some examples, the
method 700 includes receiving a set of curated data about the third-party user account based on the authentication, atblock 708. For example, theauthentication service 126 and/or thecommunity hosting service 102, an example of which is illustrated inFIG. 1 , may receive the set of curated data about the third-party user account. According to some examples, themethod 700 includes in response to the set of curated data passing a set of requirements, providing an access privilege to the user account in the server based on the received set of curated data atblock 710. For example, theauthentication service 126 and/or thecommunity hosting service 102, an example of which is illustrated inFIG. 1 , may provide the access privilege. - For example, an administrator may require that in order for a member of a server to obtain a particular seller verified role, the member must have an authorized third-party user account that has sold over 10 items on a third-party marketplace. Once the set of curate data indicates that the authorized third-party user account that has sold over 10 items on a third-party marketplace, the user account is granted the access privilege associated with the seller verified role. In some cases, the access privilege may further include access to particular channels, the ability to do voice chat, or just an privilege that the
community hosting service 102 provides. - In some cases, the method includes causing to display the set of curated data in a profile of the user account, wherein the profile includes an engageable link to the third-party application. The profile may include multiple sets of curated data associated with different third-party applications. The profile may further include any kind of defining quality associated with the third-party user account such as a rating, a follower or admirer count, a number of posts, a number of sales made, a number of sale posts, or a total of hours played in a game in the third-party application. Furthermore, analytics pertaining to how many user accounts in the server have the access privilege may be provided to the administrator and/or third parties, such as for brand deals. For example, brands would be interested in advertising in a channel that has been verified to include over a certain percentage of user that fall in their demographic.
- In some cases, a sale post associated with a third-party sale post at the third-party application may be generated and inserted as a comment in a channel associated with the server. Furthermore, the sale post may be generated from the set of curated data. The sale transaction associated with the sale post may be performed at the
community hosting service 102, which saves time for the purchaser by removing the need to open the third-party application. - In some cases, the method includes receiving a customized setting for a second access privilege that requires passing a custom set of requirements by a custom set of curated data from the third-party application. The method may further include receiving the custom set of curated data from the third-party application and in response to passing the custom set of requirements, causing to display the custom set of curated data in the profile of the user account. The customized setting may be set by an administrator of a server that changes from a default setting. In order to do so, a customization modal may be displayed in a client application associated with an administrator account whereby the customization modal provides a means for customizing what data to be extracted resulting in the custom set of curated data. The customization includes a field to include a numerical quantity associated with one of the requirements.
- Furthermore, for the third-party application that does not have a set third-party authentication protocol, for example, a
bot 106 may be attached to the server and the bot may enable customization for receiving a custom set of curated data. The bot may provide an application programming interface (API) that receives the custom set of curated data pushed from the third-party application. On the other hand, in some cases, non-customized sets of curated data are pulled from the respective third-party applications. - For example, for a third-party application that does not have an authentication protocol set with the
community hosting service 102, abot 106 may be used to enable customization for receiving a custom set of curated data for a particular server. Third-party applications that are not as widely used and may have data that only specific to that particular server, may be accessed via thebot 106. The third-party application may be a social media platform that only serves a particular country, for example. -
FIG. 8 shows an example ofcomputing system 800, which can be for example any computing device making upclient application 104,community hosting service 102, or any component thereof in which the components of the system are in communication with each other usingconnection 802.Connection 802 can be a physical connection via a bus, or a direct connection intoprocessor 804, such as in a chipset architecture.Connection 802 can also be a virtual connection, networked connection, or logical connection. - In some embodiments,
computing system 800 is a distributed system in which the functions described in this disclosure can be distributed within a datacenter, multiple data centers, a peer network, etc. In some embodiments, one or more of the described system components represents many such components each performing some or all of the function for which the component is described. In some embodiments, the components can be physical or virtual devices. -
Example computing system 800 includes at least one processing unit (CPU or processor) 804 andconnection 802 that couples various system components includingsystem memory 808, such as read-only memory (ROM) 810 and random access memory (RAM) 812 toprocessor 804.Computing system 800 can include a cache of high-speed memory 806 connected directly with, in close proximity to, or integrated as part ofprocessor 804. -
Processor 804 can include any general purpose processor and a hardware service or software service, such asservices storage device 814, configured to controlprocessor 804 as well as a special-purpose processor where software instructions are incorporated into the actual processor design.Processor 804 may essentially be a completely self-contained computing system, containing multiple cores or processors, a bus, memory controller, cache, etc. A multi-core processor may be symmetric or asymmetric. - To enable user interaction,
computing system 800 includes aninput device 826, which can represent any number of input mechanisms, such as a microphone for speech, a touch-sensitive screen for gesture or graphical input, keyboard, mouse, motion input, speech, etc.Computing system 800 can also includeoutput device 822, which can be one or more of a number of output mechanisms known to those of skill in the art. In some instances, multimodal systems can enable a user to provide multiple types of input/output to communicate withcomputing system 800.Computing system 800 can includecommunication interface 824, which can generally govern and manage the user input and system output. There is no restriction on operating on any particular hardware arrangement, and therefore the basic features here may easily be substituted for improved hardware or firmware arrangements as they are developed. -
Storage device 814 can be a non-volatile memory device and can be a hard disk or other types of computer readable media which can store data that are accessible by a computer, such as magnetic cassettes, flash memory cards, solid state memory devices, digital versatile disks, cartridges, random access memories (RAMs), read-only memory (ROM), and/or some combination of these devices. - The
storage device 814 can include software services, servers, services, etc., that when the code that defines such software is executed by theprocessor 804, it causes the system to perform a function. In some embodiments, a hardware service that performs a particular function can include the software component stored in a computer-readable medium in connection with the necessary hardware components, such asprocessor 804,connection 802,output device 822, etc., to carry out the function. - For clarity of explanation, in some instances, the present technology may be presented as including individual functional blocks including functional blocks comprising devices, device components, steps or routines in a method embodied in software, or combinations of hardware and software.
- Any of the steps, operations, functions, or processes described herein may be performed or implemented by a combination of hardware and software services or services, alone or in combination with other devices. In some embodiments, a service can be software that resides in memory of a client device and/or one or more servers of a content management system and perform one or more functions when a processor executes the software associated with the service. In some embodiments, a service is a program or a collection of programs that carry out a specific function. In some embodiments, a service can be considered a server. The memory can be a non-transitory computer-readable medium.
- In some embodiments, the computer-readable storage devices, mediums, and memories can include a cable or wireless signal containing a bit stream and the like. However, when mentioned, non-transitory computer-readable storage media expressly exclude media such as energy, carrier signals, electromagnetic waves, and signals per se.
- Methods according to the above-described examples can be implemented using computer-executable instructions that are stored or otherwise available from computer-readable media. Such instructions can comprise, for example, instructions and data which cause or otherwise configure a general purpose computer, special purpose computer, or special purpose processing device to perform a certain function or group of functions. Portions of computer resources used can be accessible over a network. The executable computer instructions may be, for example, binaries, intermediate format instructions such as assembly language, firmware, or source code. Examples of computer-readable media that may be used to store instructions, information used, and/or information created during methods according to described examples include magnetic or optical disks, solid-state memory devices, flash memory, USB devices provided with non-volatile memory, networked storage devices, and so on.
- Devices implementing methods according to these disclosures can comprise hardware, firmware and/or software, and can take any of a variety of form factors. Typical examples of such form factors include servers, laptops, smartphones, small form factor personal computers, personal digital assistants, and so on. The functionality described herein also can be embodied in peripherals or add-in cards. Such functionality can also be implemented on a circuit board among different chips or different processes executing in a single device, by way of further example.
- The instructions, media for conveying such instructions, computing resources for executing them, and other structures for supporting such computing resources are means for providing the functions described in these disclosures.
- Although a variety of examples and other information was used to explain aspects within the scope of the appended claims, no limitation of the claims should be implied based on particular features or arrangements in such examples, as one of ordinary skill would be able to use these examples to derive a wide variety of implementations. Further and although some subject matter may have been described in language specific to examples of structural features and/or method steps, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to these described features or acts. For example, such functionality can be distributed differently or performed in components other than those identified herein. Rather, the described features and steps are disclosed as examples of components of systems and methods within the scope of the appended claims.
- Illustrative examples of the disclosure include:
-
Aspect 1. A computer-implemented method, comprising: receiving, from a client application associated with a user account, a request to connect to a third-party user account associated with a third-party application with the user account that is a member of a server that supports near real-time communications through the client application; determining a third-party authentication protocol associated with the third-party application; receiving authorization to access a third-party user account using the third-party authentication protocol; receiving a set of curated data about the third-party user account from the third-party authentication protocol; and in response to the set of curated data passing a set of requirements, providing an access privilege to the user account in the server based on the received set of curated data. -
Aspect 2. The computer-implemented method ofAspect 1, further comprising: causing to display the set of curated data in a profile of the user account, wherein the profile includes an engagable link to the third-party application. -
Aspect 3. The computer-implemented method of any ofAspects 1 to 2, further comprising: presenting a rating, a follower or admirer count, a number of posts, a number of sales made, a number of sale posts, or a total of hours played in a game in the third-party application in the profile. - Aspect 4. The computer-implemented method of any of
Aspects 1 to 3, further comprising: receiving a customized setting for a second access privilege that requires passing a custom set of requirements by a custom set of curated data from the third-party application; receiving the custom set of curated data from the third-party application; and in response to passing the custom set of requirements, causing to display the custom set of curated data in the profile of the user account. - Aspect 5. The computer-implemented method of any of
Aspects 1 to 4, further comprising: causing to display a customization modal that provides a means for customizing what data to be extracted resulting in the custom set of curated data, wherein the customization includes a field to include a numerical quantity associated with one of the requirements. - Aspect 6. The computer-implemented method of any of
Aspects 1 to 5, further comprising: attaching a bot to the server, wherein the bot provides an application programming interface (API) that receives the custom set of curated data pushed from the third-party application. - Aspect 7. The computer-implemented method of any of
Aspects 1 to 6, wherein the request is for obtaining the access privilege, and wherein the access privilege allows the user account to perform one or more actions in the server. - Aspect 8. The computer-implemented method of any of
Aspects 1 to 7, wherein the access privilege provides access to a channel that requires all members to have the access privilege. - Aspect 9. The computer-implemented method of any of
Aspects 1 to 8, further comprising: providing analytics pertaining to how many user accounts in the server have the access privilege. -
Aspect 10. The computer-implemented method of any ofAspects 1 to 9, further comprising: generating a sale post associated with a third-party sale post at the third-party application; and inserting the sale post as a comment in a channel associated with the server. -
Aspect 11. The computer-implemented method of any ofAspects 1 to 10, wherein the sale post is generated from the set of curated data. - Aspect 12. The computer-implemented method of any of
Aspects 1 to 11, wherein the receiving authentication based on the third-party authentication protocol includes validating data from a public blockchain with connected wallets and signed messages. - Aspect 13. A non-transitory computer-readable medium comprising instructions, the instructions, when executed by a computing system, causes the computing system to: receive, from a client application associated with a user account, a request to connect to a third-party user account associated with a third-party application with the user account that is a member of a server that supports near real-time communications through the client application; determine a third-party authentication protocol associated with the third-party application; receive authorization to access a third-party user account using the third-party authentication protocol; receive a set of curated data about the third-party user account based on the authentication; and in response to the set of curated data passing a set of requirements, provide an access privilege to the user account in the server based on the received set of curated data.
- Aspect 14. The non-transitory computer-readable medium of Aspect 13, wherein the instructions, when executed by the computing system, causes the computing system to: cause to display the set of curated data in a profile of the user account, wherein the profile includes an engagable link to the third-party application.
- Aspect 15. The non-transitory computer-readable medium of any of Aspects 13 to 14, wherein the instructions, when executed by the computing system, causes the computing system to: present a rating, a follower or admirer count, a number of posts, a number of sales made, a number of sale posts, or a total of hours played in a game in the third-party application in the profile.
- Aspect 16. The non-transitory computer-readable medium of any of Aspects 13 to 15, wherein the instructions, when executed by the computing system, causes the computing system to: receive a customized setting for a second access privilege that requires passing a custom set of requirements by a custom set of curated data from the third-party application; receive the custom set of curated data from the third-party application; and in response to passing the custom set of requirements, cause to display the custom set of curated data in the profile of the user account.
- Aspect 17. The non-transitory computer-readable medium of any of Aspects 13 to 16, wherein the instructions, when executed by the computing system, causes the computing system to: causing to display a customization modal that provides a means for customizing what data to be extracted resulting in the custom set of curated data, wherein the customization includes a field to include a numerical quantity associated with one of the requirements.
- Aspect 18. The non-transitory computer-readable medium of any of Aspects 13 to 17, wherein the instructions, when executed by the computing system, causes the computing system to: attaching a bot to the server, wherein the bot provides an application programming interface (API) that receives the custom set of curated data pushed from the third-party application.
- Aspect 19. A system comprising: one or more processors; and a non-transitory computer-readable medium comprising instructions, the instructions, when executed by the one or more processors, causes the one or more processors to: receive, from a client application associated with a user account, a request to connect to a third-party user account associated with a third-party application with the user account that is a member of a server that supports near real-time communications through the client application; determine a third-party authentication protocol associated with the third-party application; receive authorization to access a third-party user account using the third-party authentication protocol; receive a set of curated data about the third-party user account based on the authentication; and in response to the set of curated data passing a set of requirements, provide an access privilege to the user account in the server based on the received set of curated data.
- Aspect 20. The system of Aspect 19, wherein the instructions, when executed by the one or more processors, causes the one or more processors to: causing to display the set of curated data in a profile of the user account, wherein the profile includes an engagable link to the third-party application.
Claims (20)
1. A computer-implemented method, comprising:
receiving, from a client application associated with a user account, a request to connect to a third-party user account associated with a third-party application with the user account that is a member of a server that supports near real-time communications through the client application;
determining a third-party authentication protocol associated with the third-party application;
receiving authorization to access a third-party user account using the third-party authentication protocol;
receiving a set of curated data about the third-party user account from the third-party authentication protocol; and
in response to the set of curated data passing a set of requirements, providing an access privilege to the user account in the server based on the received set of curated data.
2. The computer-implemented method of claim 1 , further comprising:
causing to display the set of curated data in a profile of the user account, wherein the profile includes an engagable link to the third-party application.
3. The computer-implemented method of claim 2 , further comprising:
presenting a rating, a follower or admirer count, a number of posts, a number of sales made, a number of sale posts, or a total of hours played in a game in the third-party application in the profile.
4. The computer-implemented method of claim 2 , further comprising:
receiving a customized setting for a second access privilege that requires passing a custom set of requirements by a custom set of curated data from the third-party application;
receiving the custom set of curated data from the third-party application; and
in response to passing the custom set of requirements, causing to display the custom set of curated data in the profile of the user account.
5. The computer-implemented method of claim 4 , further comprising:
causing to display a customization modal that provides a means for customizing what data to be extracted resulting in the custom set of curated data, wherein the customization includes a field to include a numerical quantity associated with one of the requirements.
6. The computer-implemented method of claim 4 , further comprising:
attaching a bot to the server, wherein the bot provides an application programming interface (API) that receives the custom set of curated data pushed from the third-party application.
7. The computer-implemented method of claim 1 , wherein the request is for obtaining the access privilege, and wherein the access privilege allows the user account to perform one or more actions in the server.
8. The computer-implemented method of claim 7 , wherein the access privilege provides access to a channel that requires all members to have the access privilege.
9. The computer-implemented method of claim 1 , further comprising:
providing analytics pertaining to how many user accounts in the server have the access privilege.
10. The computer-implemented method of claim 1 , further comprising:
generating a sale post associated with a third-party sale post at the third-party application; and
inserting the sale post as a comment in a channel associated with the server.
11. The computer-implemented method of claim 10 , wherein the sale post is generated from the set of curated data.
12. The computer-implemented method of claim 1 , wherein the receiving authentication based on the third-party authentication protocol includes validating data from a public blockchain with connected wallets and signed messages.
13. A non-transitory computer-readable medium comprising instructions, the instructions, when executed by a computing system, causes the computing system to:
receive, from a client application associated with a user account, a request to connect to a third-party user account associated with a third-party application with the user account that is a member of a server that supports near real-time communications through the client application;
determine a third-party authentication protocol associated with the third-party application;
receive authorization to access a third-party user account using the third-party authentication protocol;
receive a set of curated data about the third-party user account based on the authentication; and
in response to the set of curated data passing a set of requirements, provide an access privilege to the user account in the server based on the received set of curated data.
14. The non-transitory computer-readable medium of claim 13 , wherein the instructions, when executed by the computing system, causes the computing system to:
cause to display the set of curated data in a profile of the user account, wherein the profile includes an engagable link to the third-party application.
15. The non-transitory computer-readable medium of claim 14 , wherein the instructions, when executed by the computing system, causes the computing system to:
present a rating, a follower or admirer count, a number of posts, a number of sales made, a number of sale posts, or a total of hours played in a game in the third-party application in the profile.
16. The non-transitory computer-readable medium of claim 14 , wherein the instructions, when executed by the computing system, causes the computing system to:
receive a customized setting for a second access privilege that requires passing a custom set of requirements by a custom set of curated data from the third-party application;
receive the custom set of curated data from the third-party application; and
in response to passing the custom set of requirements, cause to display the custom set of curated data in the profile of the user account.
17. The non-transitory computer-readable medium of claim 16 , wherein the instructions, when executed by the computing system, causes the computing system to:
causing to display a customization modal that provides a means for customizing what data to be extracted resulting in the custom set of curated data, wherein the customization includes a field to include a numerical quantity associated with one of the requirements.
18. The non-transitory computer-readable medium of claim 16 , wherein the instructions, when executed by the computing system, causes the computing system to:
attaching a bot to the server, wherein the bot provides an application programming interface (API) that receives the custom set of curated data pushed from the third-party application.
19. A system comprising:
one or more processors; and
a non-transitory computer-readable medium comprising instructions, the instructions, when executed by the one or more processors, causes the one or more processors to:
receive, from a client application associated with a user account, a request to connect to a third-party user account associated with a third-party application with the user account that is a member of a server that supports near real-time communications through the client application;
determine a third-party authentication protocol associated with the third-party application;
receive authorization to access a third-party user account using the third-party authentication protocol;
receive a set of curated data about the third-party user account based on the authentication; and
in response to the set of curated data passing a set of requirements, provide an access privilege to the user account in the server based on the received set of curated data.
20. The system of claim 19 , wherein the instructions, when executed by the one or more processors, causes the one or more processors to:
causing to display the set of curated data in a profile of the user account, wherein the profile includes an engagable link to the third-party application.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US18/061,741 US20240187405A1 (en) | 2022-12-05 | 2022-12-05 | Third-party authentication protocols for native access control |
PCT/US2023/082294 WO2024123674A1 (en) | 2022-12-05 | 2023-12-04 | Third-party authentication protocols for native access control |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US18/061,741 US20240187405A1 (en) | 2022-12-05 | 2022-12-05 | Third-party authentication protocols for native access control |
Publications (1)
Publication Number | Publication Date |
---|---|
US20240187405A1 true US20240187405A1 (en) | 2024-06-06 |
Family
ID=89573968
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US18/061,741 Pending US20240187405A1 (en) | 2022-12-05 | 2022-12-05 | Third-party authentication protocols for native access control |
Country Status (2)
Country | Link |
---|---|
US (1) | US20240187405A1 (en) |
WO (1) | WO2024123674A1 (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020120582A1 (en) * | 2001-02-26 | 2002-08-29 | Stephen Elston | Method for establishing an electronic commerce account |
US9338007B1 (en) * | 2012-10-26 | 2016-05-10 | Google Inc. | Secure delegated authentication for applications |
US20210173962A1 (en) * | 2019-12-10 | 2021-06-10 | 11422049 Canada Inc. | Methods and systems to collect, aggregate and verify collected personal data |
US20220150277A1 (en) * | 2020-11-11 | 2022-05-12 | Microsoft Technology Licensing, Llc | Malware detonation |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
AU2020381531A1 (en) * | 2019-11-15 | 2022-06-02 | Geneva Technologies, Inc. | Customizable communications platform |
US20220351202A1 (en) * | 2021-04-29 | 2022-11-03 | Shopify Inc. | Multi-channel authentication using delegated credentials |
-
2022
- 2022-12-05 US US18/061,741 patent/US20240187405A1/en active Pending
-
2023
- 2023-12-04 WO PCT/US2023/082294 patent/WO2024123674A1/en unknown
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020120582A1 (en) * | 2001-02-26 | 2002-08-29 | Stephen Elston | Method for establishing an electronic commerce account |
US9338007B1 (en) * | 2012-10-26 | 2016-05-10 | Google Inc. | Secure delegated authentication for applications |
US20210173962A1 (en) * | 2019-12-10 | 2021-06-10 | 11422049 Canada Inc. | Methods and systems to collect, aggregate and verify collected personal data |
US20220150277A1 (en) * | 2020-11-11 | 2022-05-12 | Microsoft Technology Licensing, Llc | Malware detonation |
Also Published As
Publication number | Publication date |
---|---|
WO2024123674A4 (en) | 2024-08-02 |
WO2024123674A1 (en) | 2024-06-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US12047471B2 (en) | Integration framework and user interface for embedding transfer services into applications | |
US12058266B2 (en) | Zero-knowledge environment based social networking engine | |
EP3467692B1 (en) | Message permission management method and device, and storage medium | |
US9769122B2 (en) | Anonymous single sign-on to third-party systems | |
US9451039B1 (en) | Push notifications for web applications and browser extensions | |
US20210029125A1 (en) | Systems and methods of delegation or replication on a private network | |
EP2875463B1 (en) | Method and system for browser identity | |
US20180196694A1 (en) | Transaction analyzer using graph-oriented data structures | |
US10963869B2 (en) | System and method of cryptographically provable zero knowledge social networking | |
US20160063277A1 (en) | Method, apparatus, and media for creating social media channels | |
JP6181740B2 (en) | How to extend a web service's application programming interface using a query language | |
US10257141B2 (en) | System and method for delivering inline interactive objects encapsulated in a message | |
US20190116149A1 (en) | Cross platform social networking messaging system | |
US20220201049A1 (en) | Systems and methods for sharing content externally from a group-based communication platform | |
US11757891B1 (en) | Using a host application to authorize a user of a client device to perform an action within a guest application | |
US20240187405A1 (en) | Third-party authentication protocols for native access control | |
Jaatun et al. | Yet Another Blockchain-based Privacy-friendly Social Network | |
JP2023537698A (en) | Connection with blockchain network | |
US20200028893A1 (en) | Systems and methods for interacting with media devices | |
US20240198218A1 (en) | Undedicated lobby servers | |
US20200403958A1 (en) | Systems and methods for providing message threads across multiple platforms | |
US20150134659A1 (en) | Determining collections capable of including an object presented by a social networking system | |
US11991133B2 (en) | Real-time message moderation | |
US20220374786A1 (en) | Systems and methods for corporate event distribution and authentication | |
US20160335717A1 (en) | Systems and methods for providing subsequent payment options for identified eligible users |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: DISCORD INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:AVENT, JOHN GILBERT, JR.;CAILTEUX, JEFFREY;GU, JANIE JIA;AND OTHERS;SIGNING DATES FROM 20221129 TO 20221201;REEL/FRAME:061979/0555 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |